About Us

View As Webpage | View Archives | Email a Friend

@{mv_date_MMM d, yyyy}@
OHS Webinar

Focus On Cannabis Security is live on Oct. 21

Join Canadian Security magazine on Oct. 21 at 1PM ET for an afternoon of discussion, debate and insight from some of the leading experts in Canada on cannabis security.

VIDEO: On the Clock: Todd Milne, University Health Network

Todd Milne, director of security operations, University Health Network,  and recipient of the 2015 Security Director of the Year award, tells us how he got his start in the industry and his thoughts on working through COVID-19 as a security health-care professional.

Quebec to make masks mandatory in high school classrooms in highest COVID alert areas

The province reported 1,191 new COVID-19 cases, the highest single-day total since the beginning of the pandemic.
Sponsored Spotlight 

The next WAVE in VMS is here!

Hanwha Techwin is making its Wisenet WAVE Video Management Software even more powerful with a free upgrade that harnesses the full capabilities of our cameras, encoders and recorders. Version 4.1 allows seamless device integration with Wisenet AI cameras and lets users easily configure key camera settings including analytics, audio, hallway mode, WiseStream and more. » Learn more
Featured News 
CS Honours

CS Honours: the recap

On Oct. 1, Canadian Security hosted its third annual CS Honours event, which celebrated the accomplishments of security professionals. » Read full article
Sponsored Spotlight 

How to Protect Sensitive Data

When an employee steals sensitive data from a company it can cause irreparable harm to the reputation and finances of that business. When these events do occur, there is recourse available. In the process of performing a digital forensics examination, it can be determined what data was taken, how was taken and who took it. Data theft can take multiple forms, including stealing data internally from issued company computers and mobile phones or using personal devices to store work product. Data can even be exfiltrated from a company externally after an employee has left the organization by connecting to shared drives and cloud accounts. Whether intellectual property was stolen using complex means, or through a simple exfiltration by emailing sensitive data to personal email accounts or uploading it to personal cloud storage, these methods all leave forensic artifacts on electronic devices that can be utilized as evidence in litigation. » REGISTER NOW

Cybersecurity poll finds 84% rethink engaging with businesses hit by data breach

A large majority of Canadians are reluctant to do business with companies that suffer a data breach. » Read full article

SARS was ‘dress rehearsal for COVID-19’ but Canada failed health care workers: report

Canada's infection rate among health-care workers is four times that of China, the report says. » Read full article

Federal govt. kicks off cybersecurity month with “device appreciation” theme

October is Cybersecurity Awareness Month and the Government of Canada is aiming to appeal to Canadians' sense of familiarity and even friendship with the devices they use every day » Read full article


Location: Virtual Summit
Date: Oct. 20-21, 2020
» More Info

Focus On Cannabis Security

Location: Virtual Summit
Date: Oct. 21, 2020
» More Info

Focus On Healthcare Security

Location: Virtual Summit
Date: Dec. 3, 2020
» More Info